Wearables Open Door to Many Security Vulnerabilities

Wearables Open Door to Many Security Vulnerabilities

The popularity of wearables is growing at a staggering rate, but at what cost?

The popularity of wearables, such as fitness trackers and smart watches, is growing at a staggering rate.  These devices offer convenient and fun platforms to track workouts, check emails, and pay for groceries.  But this all comes at a cost. The security of these wearables is not keeping up, and it provides hackers with another door to users’ accounts, enabling them to steal sensitive personal information, or worse, money from their banking accounts.  

Mike Lynch, the chief strategy officer from InAuth, which provides mobile device security to most of the largest banks in the world, says this may become one of the biggest security issues facing the industry in the coming months and years. These devices are exploding in popularity, and most consumers don’t give much thought to security for them. There is a perception that because it is tethered to a smartphone that the security is already built-in, but that often is not the case. It’s critical that security needs to be built-in to the wearable devices themselves.

Security Today connected with Lynch to get a better understanding of what vulnerabilities there are and how manufacturers can better protect their devices.

What are you expecting or witnessing as far as wearables growth in the market?

Wearable devices are growing in popularity around the world. Estimates from Statista place worldwide numbers to near 1 billion devices within the next few years.

Are there security concerns with wearables?

As app developers race to create wearable-optimized versions of productivity-enhancing tools for personal and business use, and as device manufacturers race to create the latest must-have wearable gadget, security may not keep up with innovation. The increase in the number of native applications available for smartwatches will create new opportunities for fraudsters to compromise wearable devices for access to highly valuable personal information.

What does InAuth do today in the security space, and how do you see future alignment with wearables technology?

InAuth is a leading provider of mobile device authentication solutions, which help organizations facilitate seamless digital transactions. Our technology is used to identify security threats by analyzing the mobile device itself. With wearable devices, there is a high risk for fraud because there has not been much of an industry emphasis on security for wearable devices, at least as compared with smartphones. InAuth can directly address a critical need for this growing market.

Potential threats range from exposure of details of people’s exercise activities (such as their walking paths or running speeds), to the potential compromise of financial information if a consumer is using a wearable device that is enabled to make payments.

What is the potential risk that wearables present for the enterprise environment?

Wearables linked to mobile devices, which are in turn linked to a corporate network, open organizations up to additional risks of attack. Even though the wearable itself may not be the primary target of an attack, its link to a mobile device creates another point of entry for cybercriminals to exploit—especially since wearables security is a relatively a new frontier. Information that can be stolen and exploited includes real-time geolocation information, emails, contacts, and other proprietary information on the device.

What are some of the risks for consumers that use wearables?

From simple fitness trackers that connect to a mobile phone, to stand-alone smartwatches, potentially sensitive personal and sometimes financial information is being passed to the app and to the manufacturer. Users may be asked for access to their files, location, contacts, camera and personal information (age, height, weight, and gender).

What could manufacturers do better to make wearables more secure?

Manufacturers of wearable devices should ensure their information security professionals remain vigilant about mobile device security and acknowledge the unique risks posed by wearable devices. When partnering with security vendors, they should work with those that specialize in both mobile and wearable application security.

To protect paired mobile devices from point-of-entry attacks that originate with wearables, organizations should implement authentication protocols that leverage biometric technology, versus an ID and password combination, which is more easily compromised in mass breaches and susceptible to phishing.

Manufacturers should also invest in digital authentication and fraud prevention solutions. Organizations should seek to authenticate at the device-level to offer the strongest level of identity verification. A mobile phone has thousands of attributes that are part of the device itself and can be used to uncover and analyze risk factors that could lead to potentially fraudulent activities.

What could the wearable user do to better protect themselves?

There are several simple steps that users can take:

  • Opt-in only for the information required for use of the app.
  • Leverage the highest level of security offered, such as biometrics.
  • Practice good password hygiene if passwords must be used, including not reusing passwords across multiple applications and changing passwords periodically.
  • Be knowledgeable about attempts to phish for information from those appearing as their manufacturer. Don’t click on links in emails or texts unless you are sure they are from a trustworthy source.
  • Download software updates when they are available, as many software updates patch known vulnerabilities.

Can you tell us what kind of wearable devices for which you are providing protection?

Those that are tied to major mobile platforms – IOS and Android. We also have wearables that operate independently from the mobile phone on our roadmap.

What specifically does InAuth do to protect wearables?

We provide intelligence on the mobile device itself. We look for the location of the device, whether there are any fraud tools on the device, is there any installed malicious software that is making the device appear to be another device/number (‘spoofing’), is there malware on it, and has the device been jailbroken, which makes them more vulnerable. That takes authentication to a new level and can result in less customer friction, fewer authentication steps, but stronger security and fewer "false positives".

Do you protect just the mobile device the wearable interacts with or do you also protect the wearable device itself?

Today we protect the mobile device, the mobile application data, the consumer, and the client organization using InAuth’s technology by detecting malware and providing intelligence that allows the organization to determine if a digital interaction is a fraudulent attempt or if a consumer’s data is at risk. In the future we may also protect certain wearables that are independent from the mobile device.

Where do you see wearable security going in the future?

There will be more wearables that are not paired with a mobile device. For many wearables that can operate independently from paired mobile devices, the same critical authentication measures are still possible. It is possible to permanently identify a type of wearable device the same way you would a mobile device. It is a matter of gathering the right factors to distinguish the type of device (e.g. smart watch or fitness tracker) and create a unique ID. In addition, other intelligence will be available to assess the risk of the transaction or interaction.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3